Formal Methods for Information Security
-
Michael Reichle, Ralf Sasse, Christoph Sprenger
-
Spring Semester
-
Location: rack 10, shelf 2
The course focuses on formal methods for the modeling and analysis of security protocols for critical systems, ranging from key establishment protocols for secure communication to RFID protocols for identification. In addition, we discuss cryptographic modeling and analysis of security properties of protocols.
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
The modelling and analysis of security protocolsThe CSP approach P.Y.A. Ryan and S.A. Schneider
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
Operational semantics and verification of security protocolsCas Cremers, Sjouke Mauw
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
Handbook of applied cryptographyAlfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
Protocols for authentication and key establishmentColin Boyd, Anish Mathuria
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
Formal correctness of security protocolsGiampaolo Bella
|
AVAILABLE
ONLINE VERSION